Authentication protocol

Results: 881



#Item
1Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2009-02-25 10:33:23
    2Lapin: An Efficient Authentication Protocol Based on Ring-LPN Stefan Heyse1 , Eike Kiltz1 , Vadim Lyubashesvky2 , Christof Paar1 , and Krzysztof Pietrzak3? 1  Ruhr-Universit¨at Bochum

    Lapin: An Efficient Authentication Protocol Based on Ring-LPN Stefan Heyse1 , Eike Kiltz1 , Vadim Lyubashesvky2 , Christof Paar1 , and Krzysztof Pietrzak3? 1 Ruhr-Universit¨at Bochum

    Add to Reading List

    Source URL: www.iacr.org

    - Date: 2012-03-01 05:54:47
      3A Bi-direction Authentication Protocol for RFID Based on the Variable Update in IOT† Liu Yang1,2*, Peng Yu 2,Wang Bailing 1, Qu Yun1, Yuan Xinling 1,Yin zelong1 1 Department of Computer Science & Technology Harbin Inst

      A Bi-direction Authentication Protocol for RFID Based on the Variable Update in IOT† Liu Yang1,2*, Peng Yu 2,Wang Bailing 1, Qu Yun1, Yuan Xinling 1,Yin zelong1 1 Department of Computer Science & Technology Harbin Inst

      Add to Reading List

      Source URL: onlinepresent.org

      - Date: 2013-04-22 21:08:07
        4Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

        Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

        Add to Reading List

        Source URL: iaoc.ietf.org

        - Date: 2015-11-01 16:21:27
          5Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

          Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

          Add to Reading List

          Source URL: theory.stanford.edu

          - Date: 2010-03-09 22:02:41
            6

            PDF Document

            Add to Reading List

            Source URL: www.inforouter.com

            Language: English - Date: 2015-03-26 12:13:27
            7Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

            Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

            Add to Reading List

            Source URL: ietf.org

            Language: English - Date: 2014-03-02 06:27:58
            8BB Frontline Supervisorpub

            BB Frontline Supervisorpub

            Add to Reading List

            Source URL: gato-docs.its.txstate.edu

            Language: English - Date: 2016-08-20 06:33:20
            9Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

            Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

            Add to Reading List

            Source URL: systempay.cyberpluspaiement.com

            Language: English - Date: 2015-12-16 04:48:58
            10Wireless networking / IEEE 802 / IEEE 802.11 / IEEE 802.21 / Extensible Authentication Protocol / Computing / Station / Institute of Electrical and Electronics Engineers / Technology

            March 2007 doc.: IEEE0476r1 IEEE P802.11 Wireless LANs Liaison Response to IETF ECRIT Date:

            Add to Reading List

            Source URL: mentor.ieee.org

            Language: English - Date: 2011-06-28 18:41:54